de.iterate logo

Decoding the SOC 2 Common Criteria List

Decoding the SOC 2 Common Criteria List

Decoding the SOC 2 Common Criteria List

10 Nov 2023

In today's digital age, protecting sensitive information and ensuring operational excellence is paramount for businesses. One of the tools that companies use to demonstrate their commitment to security and operational efficiency is the SOC 2 framework.


The AICPA has outlined five Trust Services Criteria for assessing an organisation's security measures in the context of SOC 2 compliance. These are: security, availability, processing integrity, confidentiality, and privacy.


Although organisations have the flexibility to decide which Trust Services Criteria to incorporate in their audit, the Security Criteria is mandatory for all SOC 2 reports. The standards employed to evaluate this criterion are referred to as the Common Criteria, often referred to as the CC-series. This list comprises nine subcategories that lay the groundwork for organisations to build upon.


1. CC1 — Control Environment

Does the organisation uphold and prioritise values of integrity and security?

The control environment sets the tone for an organisation, determining the integrity and security ethos. It examines the organisation's internal culture, the commitment of its leadership, and the competence of its staff in maintaining a secure environment.


2. CC2 — Communication and Information

Are there well-defined policies and procedures in place to ensure security? How well are these protocols communicated to both internal teams and external stakeholders?

Effective communication of security protocols is as crucial as establishing them. An organisation's ability to disseminate this information effectively is key to its overall security posture.


3. CC3 — Risk Assessment

Does the organisation periodically assess risks and monitor the impact of any changes on these risks?

Every organisation, regardless of size or industry, faces risks. This criterion evaluates the organisation's ability to identify and analyse these risks. A proactive approach to risk assessment can avert potential pitfalls.


4. CC4 — Monitoring Controls

How does the organisation oversee, assess, and convey the efficacy of its controls?

Continuous monitoring ensures that controls remain effective over time. Regular evaluation and communication about the status of controls are vital for maintaining a robust defence mechanism.


5. CC5 — Control Activities

Does the organisation have essential controls, methodologies, and technologies to diminish risks?

This section dives into the nitty-gritty of the actual controls set in place. This involves scrutinising the measures taken to safeguard assets and data.


6. CC6 — Logical and Physical Access Controls

How does the organisation safeguard its data encryption practices? How does it regulate who has access to this data and restrict physical entry to critical areas like server rooms?

Protecting access, both digital and physical, is a primary concern.


7. CC7 — System Operations

Are systems consistently overseen to confirm they operate effectively? Does the organisation have incident response mechanisms and disaster recovery strategies in place?

With the intricacies of digital operations, ensuring systems function optimally is crucial.


8. CC8 — Change Management

Are significant adjustments to systems tested and greenlit before deployment?

The tech landscape is ever-evolving, making system changes inevitable. Proper vetting processes ensure changes do not introduce vulnerabilities.


9. CC9 — Risk Mitigation

How does the organisation counteract risks through effective business processes and adept vendor management?

Beyond identifying risks, addressing them is equally vital. Effective risk mitigation strategies can mean the difference between secure operations and significant vulnerabilities.


The SOC 2 Common Criteria offers a comprehensive framework for organisations to build a secure and efficient operational environment. Understanding each criterion can help businesses align their strategies more effectively, so that they comply with SOC 2 standards and optimise their operations for the digital age.


In today's digital age, protecting sensitive information and ensuring operational excellence is paramount for businesses. One of the tools that companies use to demonstrate their commitment to security and operational efficiency is the SOC 2 framework.


The AICPA has outlined five Trust Services Criteria for assessing an organisation's security measures in the context of SOC 2 compliance. These are: security, availability, processing integrity, confidentiality, and privacy.


Although organisations have the flexibility to decide which Trust Services Criteria to incorporate in their audit, the Security Criteria is mandatory for all SOC 2 reports. The standards employed to evaluate this criterion are referred to as the Common Criteria, often referred to as the CC-series. This list comprises nine subcategories that lay the groundwork for organisations to build upon.


1. CC1 — Control Environment

Does the organisation uphold and prioritise values of integrity and security?

The control environment sets the tone for an organisation, determining the integrity and security ethos. It examines the organisation's internal culture, the commitment of its leadership, and the competence of its staff in maintaining a secure environment.


2. CC2 — Communication and Information

Are there well-defined policies and procedures in place to ensure security? How well are these protocols communicated to both internal teams and external stakeholders?

Effective communication of security protocols is as crucial as establishing them. An organisation's ability to disseminate this information effectively is key to its overall security posture.


3. CC3 — Risk Assessment

Does the organisation periodically assess risks and monitor the impact of any changes on these risks?

Every organisation, regardless of size or industry, faces risks. This criterion evaluates the organisation's ability to identify and analyse these risks. A proactive approach to risk assessment can avert potential pitfalls.


4. CC4 — Monitoring Controls

How does the organisation oversee, assess, and convey the efficacy of its controls?

Continuous monitoring ensures that controls remain effective over time. Regular evaluation and communication about the status of controls are vital for maintaining a robust defence mechanism.


5. CC5 — Control Activities

Does the organisation have essential controls, methodologies, and technologies to diminish risks?

This section dives into the nitty-gritty of the actual controls set in place. This involves scrutinising the measures taken to safeguard assets and data.


6. CC6 — Logical and Physical Access Controls

How does the organisation safeguard its data encryption practices? How does it regulate who has access to this data and restrict physical entry to critical areas like server rooms?

Protecting access, both digital and physical, is a primary concern.


7. CC7 — System Operations

Are systems consistently overseen to confirm they operate effectively? Does the organisation have incident response mechanisms and disaster recovery strategies in place?

With the intricacies of digital operations, ensuring systems function optimally is crucial.


8. CC8 — Change Management

Are significant adjustments to systems tested and greenlit before deployment?

The tech landscape is ever-evolving, making system changes inevitable. Proper vetting processes ensure changes do not introduce vulnerabilities.


9. CC9 — Risk Mitigation

How does the organisation counteract risks through effective business processes and adept vendor management?

Beyond identifying risks, addressing them is equally vital. Effective risk mitigation strategies can mean the difference between secure operations and significant vulnerabilities.


The SOC 2 Common Criteria offers a comprehensive framework for organisations to build a secure and efficient operational environment. Understanding each criterion can help businesses align their strategies more effectively, so that they comply with SOC 2 standards and optimise their operations for the digital age.


In today's digital age, protecting sensitive information and ensuring operational excellence is paramount for businesses. One of the tools that companies use to demonstrate their commitment to security and operational efficiency is the SOC 2 framework.


The AICPA has outlined five Trust Services Criteria for assessing an organisation's security measures in the context of SOC 2 compliance. These are: security, availability, processing integrity, confidentiality, and privacy.


Although organisations have the flexibility to decide which Trust Services Criteria to incorporate in their audit, the Security Criteria is mandatory for all SOC 2 reports. The standards employed to evaluate this criterion are referred to as the Common Criteria, often referred to as the CC-series. This list comprises nine subcategories that lay the groundwork for organisations to build upon.


1. CC1 — Control Environment

Does the organisation uphold and prioritise values of integrity and security?

The control environment sets the tone for an organisation, determining the integrity and security ethos. It examines the organisation's internal culture, the commitment of its leadership, and the competence of its staff in maintaining a secure environment.


2. CC2 — Communication and Information

Are there well-defined policies and procedures in place to ensure security? How well are these protocols communicated to both internal teams and external stakeholders?

Effective communication of security protocols is as crucial as establishing them. An organisation's ability to disseminate this information effectively is key to its overall security posture.


3. CC3 — Risk Assessment

Does the organisation periodically assess risks and monitor the impact of any changes on these risks?

Every organisation, regardless of size or industry, faces risks. This criterion evaluates the organisation's ability to identify and analyse these risks. A proactive approach to risk assessment can avert potential pitfalls.


4. CC4 — Monitoring Controls

How does the organisation oversee, assess, and convey the efficacy of its controls?

Continuous monitoring ensures that controls remain effective over time. Regular evaluation and communication about the status of controls are vital for maintaining a robust defence mechanism.


5. CC5 — Control Activities

Does the organisation have essential controls, methodologies, and technologies to diminish risks?

This section dives into the nitty-gritty of the actual controls set in place. This involves scrutinising the measures taken to safeguard assets and data.


6. CC6 — Logical and Physical Access Controls

How does the organisation safeguard its data encryption practices? How does it regulate who has access to this data and restrict physical entry to critical areas like server rooms?

Protecting access, both digital and physical, is a primary concern.


7. CC7 — System Operations

Are systems consistently overseen to confirm they operate effectively? Does the organisation have incident response mechanisms and disaster recovery strategies in place?

With the intricacies of digital operations, ensuring systems function optimally is crucial.


8. CC8 — Change Management

Are significant adjustments to systems tested and greenlit before deployment?

The tech landscape is ever-evolving, making system changes inevitable. Proper vetting processes ensure changes do not introduce vulnerabilities.


9. CC9 — Risk Mitigation

How does the organisation counteract risks through effective business processes and adept vendor management?

Beyond identifying risks, addressing them is equally vital. Effective risk mitigation strategies can mean the difference between secure operations and significant vulnerabilities.


The SOC 2 Common Criteria offers a comprehensive framework for organisations to build a secure and efficient operational environment. Understanding each criterion can help businesses align their strategies more effectively, so that they comply with SOC 2 standards and optimise their operations for the digital age.


© Secureroo Pty Ltd, 2021-2023

© Secureroo Pty Ltd, 2023